2022
DOI: 10.3390/jsan11040066
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Hybrid Scheme for Hiding Text Messages in Colour Images Using LSB, Lah Transform and Chaotic Techniques

Abstract: Data security can involve embedding hidden images, text, audio, or video files within other media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a high risk of security breaches or large computational costs, however. The method proposed in this work incorporates low-complexity encryption and steganography mechanisms to enhance security during transmission while lowering computational complexity. In message encryption, it is recommended that text file data slicing in binary rep… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(23 citation statements)
references
References 50 publications
0
23
0
Order By: Relevance
“…In terms of privacy,failure to offer user anonymity, anonymity of tags and readers, attacker access to the user's private information, as well as traceability. On the other hand, performance challenges are manifested in terms of stability challenges, high communication [174], storage [175], and computation overheads [176].…”
Section: Resultsmentioning
confidence: 99%
“…In terms of privacy,failure to offer user anonymity, anonymity of tags and readers, attacker access to the user's private information, as well as traceability. On the other hand, performance challenges are manifested in terms of stability challenges, high communication [174], storage [175], and computation overheads [176].…”
Section: Resultsmentioning
confidence: 99%
“…On the other hand, a blockchain based scheme is developed in [110] for secure image transmission and diagnoses. On the flip side, the blockchain technologies in [83], [89], [97], [70], [99], [102], [103], [106], [107], [109] has high space and computation complexities [111].…”
Section: Figurementioning
confidence: 99%
“…Based on radio-frequency identification (RFID), an authentication protocol for cloud environment is introduced in [51], while an anonymous authentication technique is proposed in [52]. However, these two schemes have high computation costs [53] at the tag side. Although the scheme in [54] can address this issue, it fails to protect against impersonation attacks.…”
Section: Security Schemes For Cloud Environmentmentioning
confidence: 99%